Sciweavers

17018 search results - page 3261 / 3404
» From the How to the What
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
AIPR
2000
IEEE
14 years 2 months ago
Moving Object Tracking in Video
The advance of technology makes video acquisition devices better and less costly, thereby increasing the number of applications that can effectively utilize digital video. Compare...
Yiwei Wang, John F. Doherty, Robert E. Van Dyck
ASYNC
2000
IEEE
122views Hardware» more  ASYNC 2000»
14 years 2 months ago
DUDES: A Fault Abstraction and Collapsing Framework for Asynchronous Circuits
Fault Abstraction and Collapsing Framework for Asynchronous Circuits Philip P. Shirvani, Subhasish Mitra Center for Reliable Computing Stanford University Stanford, CA Jo C. Eberge...
Philip P. Shirvani, Subhasish Mitra, Jo C. Ebergen...
CSMR
2000
IEEE
14 years 2 months ago
Analyzing Java Software by Combining Metrics and Program Visualization
Shimba, a prototype reverse engineering environment, has been built to support the understanding of Java software. Shimba uses Rigi and SCED to analyze, visualize, and explore the...
Tarja Systä, Ping Yu, Hausi A. Müller
DCC
2000
IEEE
14 years 2 months ago
Multi-Resolution Adaptation of the SPIHT Algorithm for Multiple Description
Multiple description codes are data compression algorithms designed with the goal of minimizing the distortion caused by data loss in packet-based or diversity communications syst...
Nedeljko Varnica, Michael Fleming, Michelle Effros
« Prev « First page 3261 / 3404 Last » Next »